cnvd-2020-02183
Vulnerability from cnvd

Title: Microsoft Remote Desktop Protocol拒绝服务漏洞

Description:

Microsoft Windows 10等都是美国微软(Microsoft)公司发布的一系列操作系统。Remote Desktop Protocol(RDP)是其中的一个基于Windows系统中的多通道(multi-channel)的协议,它能够远程连接和控制服务器或电脑。

Microsoft Remote Desktop Protocol中存在拒绝服务漏洞。攻击者可通过连接目标系统并发送特制的请求利用该漏洞造成目标系统上的RDP服务停止响应。

Severity:

Patch Name: Microsoft Remote Desktop Protocol拒绝服务漏洞的补丁

Patch Description:

Microsoft Windows 10等都是美国微软(Microsoft)公司发布的一系列操作系统。Remote Desktop Protocol(RDP)是其中的一个基于Windows系统中的多通道(multi-channel)的协议,它能够远程连接和控制服务器或电脑。

Microsoft Remote Desktop Protocol中存在拒绝服务漏洞。攻击者可通过连接目标系统并发送特制的请求利用该漏洞造成目标系统上的RDP服务停止响应。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

用户可参考如下厂商提供的安全补丁以修复该漏洞: https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1453

Reference: https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1453

Impacted products
Name
['Microsoft Windows Server 2008', 'Microsoft Windows 7 SP1', 'Microsoft Windows Windows Server 2012', 'Microsoft Windows 8.1', 'Microsoft Windows RT 8.1 SP0', 'Microsoft Windows Server 2012 R2', 'Microsoft Windows 10', 'Microsoft Windows 10 1607', 'Microsoft Windows Server 2016', 'Microsoft Windows 10 1703', 'Microsoft Windows 10 1709', 'Microsoft Windows Server 1803', 'Microsoft Windows Server 2019', 'Microsoft Windows Server 1903', 'Microsoft Windows 10 1803', 'Microsoft Windows 10 1809', 'Microsoft Windows 10 1903', 'Microsoft Windows 10 1909', 'Microsoft Windows Server 1909']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2019-1453",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-1453"
    }
  },
  "description": "Microsoft Windows 10\u7b49\u90fd\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u53d1\u5e03\u7684\u4e00\u7cfb\u5217\u64cd\u4f5c\u7cfb\u7edf\u3002Remote Desktop Protocol\uff08RDP\uff09\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u57fa\u4e8eWindows\u7cfb\u7edf\u4e2d\u7684\u591a\u901a\u9053\uff08multi-channel\uff09\u7684\u534f\u8bae\uff0c\u5b83\u80fd\u591f\u8fdc\u7a0b\u8fde\u63a5\u548c\u63a7\u5236\u670d\u52a1\u5668\u6216\u7535\u8111\u3002\n\nMicrosoft Remote Desktop Protocol\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8fde\u63a5\u76ee\u6807\u7cfb\u7edf\u5e76\u53d1\u9001\u7279\u5236\u7684\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u76ee\u6807\u7cfb\u7edf\u4e0a\u7684RDP\u670d\u52a1\u505c\u6b62\u54cd\u5e94\u3002",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1453",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2020-02183",
  "openTime": "2020-01-14",
  "patchDescription": "Microsoft Windows 10\u7b49\u90fd\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u53d1\u5e03\u7684\u4e00\u7cfb\u5217\u64cd\u4f5c\u7cfb\u7edf\u3002Remote Desktop Protocol\uff08RDP\uff09\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u57fa\u4e8eWindows\u7cfb\u7edf\u4e2d\u7684\u591a\u901a\u9053\uff08multi-channel\uff09\u7684\u534f\u8bae\uff0c\u5b83\u80fd\u591f\u8fdc\u7a0b\u8fde\u63a5\u548c\u63a7\u5236\u670d\u52a1\u5668\u6216\u7535\u8111\u3002\r\n\r\nMicrosoft Remote Desktop Protocol\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8fde\u63a5\u76ee\u6807\u7cfb\u7edf\u5e76\u53d1\u9001\u7279\u5236\u7684\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u76ee\u6807\u7cfb\u7edf\u4e0a\u7684RDP\u670d\u52a1\u505c\u6b62\u54cd\u5e94\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Microsoft Remote Desktop Protocol\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Microsoft Windows Server 2008",
      "Microsoft Windows 7 SP1",
      "Microsoft Windows Windows Server 2012",
      "Microsoft Windows 8.1",
      "Microsoft Windows RT 8.1 SP0",
      "Microsoft Windows Server 2012 R2",
      "Microsoft Windows 10",
      "Microsoft Windows 10 1607",
      "Microsoft Windows Server 2016",
      "Microsoft Windows 10 1703",
      "Microsoft Windows 10 1709",
      "Microsoft Windows Server 1803",
      "Microsoft Windows Server 2019",
      "Microsoft Windows Server 1903",
      "Microsoft Windows 10 1803",
      "Microsoft Windows 10 1809",
      "Microsoft Windows 10 1903",
      "Microsoft Windows 10 1909",
      "Microsoft Windows Server 1909"
    ]
  },
  "referenceLink": "https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1453",
  "serverity": "\u4e2d",
  "submitTime": "2019-12-16",
  "title": "Microsoft Remote Desktop Protocol\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…